Preferred Language
Articles
/
jih-2710
Fully Automated Magnetic Resonance Detection and Segmentation of Brain using Convolutional Neural Network
...Show More Authors

     The brain's magnetic resonance imaging (MRI) is tasked with finding the pixels or voxels that establish where the brain is in a medical image The Convolutional Neural Network (CNN) can process curved baselines that frequently occur in scanned documents. Next, the lines are separated into characters. In the Convolutional Neural Network (CNN) can process curved baselines that frequently occur in scanned documents case of fonts with a fixed MRI width, the gaps are analyzed and split. Otherwise, a limited region above the baseline is analyzed, separated, and classified. The words with the lowest recognition score are split into further characters x until the result improves. If this does not improve the recognition score, contours are merged and classified again to check the change in the recognition score. The features for classification are extracted from small fixed-size patches over neighboring contours and matched against the trained deep learning representations this approach enables Tesseract to easily handle MRI sample results broken into multiple parts, which is impossible if each contour is processed separately Hard to read! Try to split sentences. The CNN inception network seem to be a suitable choice for the evaluation of the synthetic MRI samples with 3000 features, and 12000 samples of images as data augmentation capacities favors data which is similar to the original training set and thus unlikely to contain new information content with an accuracy of 98.68%. The error is only 1.32% with the increasing the number of training samples, but the most significant impact in reducing the error can be made by increasing the number of samples.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Dec 01 2022
Journal Name
Neuroscience Informatics
Epileptic EEG activity detection for children using entropy-based biomarkers
...Show More Authors

View Publication
Crossref (6)
Crossref
Publication Date
Sat Dec 28 2024
Journal Name
Iraqi Journal Of Science
EXTRACELLULAR SUPEROXIDE DISMUTASE CHANGES IN PATIENTS WITH DIFFERENT BRAIN TUMORS
...Show More Authors

The Specific activity of extracellular superoxide dismutase (EC-SOD) was measured in healthy persons and in patients with benign and malignant brain tumors. The results show decrease of the EC-SOD specific activity in sera of patients with benign and malignant brain tumors in comparison to that of control group.This study concentrated on studying the changes that occur in sera EC-SOD activity of patients with benign and malignant brain tumors, in comparison to that of normal individuals. The result also revealed that this isoenzyme is present in many different molecular weights forms (as judged by polyacrylamide gel electrophoresis), some of these with no enzymatic activity. Conversion among these forms occurs in the malignant sera

View Publication Preview PDF
Publication Date
Sat Jun 01 2024
Journal Name
Journal Of Engineering
Copy Move Image Forgery Detection using Multi-Level Local Binary Pattern Algorithm
...Show More Authors

Digital image manipulation has become increasingly prevalent due to the widespread availability of sophisticated image editing tools. In copy-move forgery, a portion of an image is copied and pasted into another area within the same image. The proposed methodology begins with extracting the image's Local Binary Pattern (LBP) algorithm features. Two main statistical functions, Stander Deviation (STD) and Angler Second Moment (ASM), are computed for each LBP feature, capturing additional statistical information about the local textures. Next, a multi-level LBP feature selection is applied to select the most relevant features. This process involves performing LBP computation at multiple scales or levels, capturing textures at different

... Show More
Crossref
Publication Date
Thu Oct 20 2022
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Investigating the Structural and Magnetic Properties of Nickel Oxide Nanoparticles Prepared by Precipitation Method
...Show More Authors

This work used the deposition method to synthesize nickel oxide nanoparticles. The materials mainly used in this study were nickel sulfate hexahydrate (as a precursor) and NaOH (as a precipitant). The properties of the nanopowder were characterized by XRD, FE-SEM, EDX, and VSM. The obtained results confirmed the presence of nickel oxide nanoparticles with a face-centered cubic (FCC) structure with a lattice constant (a=4.17834 Å). Scherer and Williamson-Hall equations were used to calculate the crystallite size of about (30.5-35.5) nm. The FE-SEM images showed that the particle shape had a ball-like appearance with a uniform and homogeneous distribution and confirmed that the particles were within the nanoscale. The presence of oxygen a

... Show More
View Publication Preview PDF
Crossref (10)
Crossref
Publication Date
Sun Aug 13 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Calculating the Resolving Power For Symmetrical Double Pole Piece Magnetic Lenses By Using A Preassigned Analytical Functions
...Show More Authors

 In this theoretical paper  and depending on the optimization synthesis method for electron magnetic lenses a theoretical  computational investigation was carried out to calculate the Resolving Power for the symmetrical double pole piece magnetic lenses,  under the absence of magnetic saturation, operated by the mode of telescopic operation by using symmetrical magnetic field for some analytical functions well-known in electron optics such as Glaser’s Bell-shaped model,  Grivet-Lenz model, Gaussian field model  and Hyperbolic tangent field model.       This work can be extended further by using the same or other models for asymmetrical or symmetrical axial magnetic field

... Show More
View Publication Preview PDF
Publication Date
Wed Jun 12 2013
Journal Name
International Journal Of Computer Applications
Design and Implementation of a Practical FTTH Network
...Show More Authors

Fiber-to-the-Home (FTTH) has long been recognized as a technology that provides future proof bandwidth [1], but has generally been too expensive to implement on a wide scale. However, reductions in the cost of electro-optic components and improvements in the handling of fiber optics now make FTTH a cost effective solution in many situations. The transition to FTTH in the access network is also a benefit for both consumers and service providers because it opens up the near limitless capacity of the core long-haul network to the local user. In this paper individual passive optical components, transceivers, and fibers has been put together to form a complete FTTH network. Then the implementation of the under construction Baghdad/Al

... Show More
View Publication Preview PDF
Publication Date
Fri Dec 29 2017
Journal Name
Al-khwarizmi Engineering Journal
Design and Implementation of a Proposal Network Firewall
...Show More Authors

 

In today's world, most business, regardless of size, believe that access to Internet is imperative if they are going to complete effectively. Yet connecting a private computer (or a network) to the Internet can expose critical or confidential data to malicious attack from anywhere in the world since unprotected connections to the Internet (or any network topology) leaves the user computer vulnerable to hacker attacks and other Internet threats. Therefore, to provide high degree of protection to the network and network's user, Firewall need to be used.

Firewall provides a barrier between the user computer and the Internet (i.e. it prevents unauthor

... Show More
View Publication Preview PDF
Publication Date
Sat Apr 30 2022
Journal Name
Eastern-european Journal Of Enterprise Technologies
Improvement of noisy images filtered by bilateral process using a multi-scale context aggregation network
...Show More Authors

Deep learning has recently received a lot of attention as a feasible solution to a variety of artificial intelligence difficulties. Convolutional neural networks (CNNs) outperform other deep learning architectures in the application of object identification and recognition when compared to other machine learning methods. Speech recognition, pattern analysis, and image identification, all benefit from deep neural networks. When performing image operations on noisy images, such as fog removal or low light enhancement, image processing methods such as filtering or image enhancement are required. The study shows the effect of using Multi-scale deep learning Context Aggregation Network CAN on Bilateral Filtering Approximation (BFA) for d

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Sat Mar 19 2022
Journal Name
Al-khwarizmi Engineering Journal
Developing an Automated Vision System for Maintaing Social Distancing to Cure the Pandemic
...Show More Authors

The world is currently facing a medical crisis. The epidemic has affected millions of people around the world since its appearance. This situation needs an urgent solution. Most countries have used different solutions to stop the spread of the epidemic. The World Health Organization has imposed some rules that people should adhere. The rules are such, wearing masks, quarantining infected people and social distancing. Social distancing is one of the most important solutions that have given good results to confront the emerging virus. Several systems have been developed that use artificial intelligence and deep learning to track social distancing. In this study, a system based on deep learning has been proposed. The system includes monitor

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Tue Nov 01 2016
Journal Name
Journal Of Economics And Administrative Sciences
Use Dynamic Bayesian network to estimate the reliability of Adamia Water Network
...Show More Authors

Abstract\

In this research, estimated the reliability of water system network in Baghdad was done. to assess its performance during a specific period. a fault tree through static and dynamic gates was belt and these gates represent logical relationships between the main events in the network and analyzed using dynamic Bayesian networks . As it has been applied Dynamic Bayesian networks estimate reliability by translating dynamic fault tree to Dynamic Bayesian networks and reliability of the system appreciated. As was the potential for the expense of each phase of the network for each gate . Because there are two parts to the Dynamic Bayesian networks and two part of gate (AND), which includes the three basic units of the

... Show More
View Publication Preview PDF
Crossref